{"id":"https://openalex.org/W2140677968","doi":"https://doi.org/10.1109/tit.2009.2030434","title":"Truly Efficient $2$-Round Perfectly Secure Message Transmission Scheme","display_name":"Truly Efficient $2$-Round Perfectly Secure Message Transmission Scheme","publication_year":2009,"publication_date":"2009-10-27","ids":{"openalex":"https://openalex.org/W2140677968","doi":"https://doi.org/10.1109/tit.2009.2030434","mag":"2140677968"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2009.2030434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2009.2030434","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110190606","display_name":"Kaoru Kurosawa","orcid":null},"institutions":[{"id":"https://openalex.org/I6178835","display_name":"Ibaraki University","ror":"https://ror.org/00sjd5653","country_code":"JP","type":"education","lineage":["https://openalex.org/I6178835"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kaoru Kurosawa","raw_affiliation_strings":["Department of Computer and Information Sciences, Ibaraki University, Ibaraki, Japan","Dept. of Comput. & Inf. Sci., Ibaraki Univ., Hitachi, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Ibaraki University, Ibaraki, Japan","institution_ids":["https://openalex.org/I6178835"]},{"raw_affiliation_string":"Dept. of Comput. & Inf. Sci., Ibaraki Univ., Hitachi, Japan","institution_ids":["https://openalex.org/I6178835"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020294120","display_name":"Kazuhiro Suzuki","orcid":"https://orcid.org/0000-0002-9081-538X"},"institutions":[{"id":"https://openalex.org/I41802502","display_name":"Kanagawa University","ror":"https://ror.org/02j6c0d67","country_code":"JP","type":"education","lineage":["https://openalex.org/I41802502"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuhiro Suzuki","raw_affiliation_strings":["Department of Electronics and Informatics Frontier, Kanagawa University, Yokohama, Kanagawa, Japan","Dept. of Electron. & Inf. Frontier, Kanagawa Univ., Yokohama, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Informatics Frontier, Kanagawa University, Yokohama, Kanagawa, Japan","institution_ids":["https://openalex.org/I41802502"]},{"raw_affiliation_string":"Dept. of Electron. & Inf. Frontier, Kanagawa Univ., Yokohama, Japan","institution_ids":["https://openalex.org/I41802502"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110190606"],"corresponding_institution_ids":["https://openalex.org/I6178835"],"apc_list":null,"apc_paid":null,"fwci":3.4894,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.93131028,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"55","issue":"11","first_page":"5223","last_page":"5232"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.9292385578155518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.631024956703186},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.5416780710220337},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5310809016227722},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5129954218864441},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5098968744277954},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4983959197998047},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4748908579349518},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.4623905420303345},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4426795542240143},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.4143868386745453},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3501613736152649},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3444841504096985},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27766484022140503},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23682859539985657}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.9292385578155518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.631024956703186},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.5416780710220337},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5310809016227722},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5129954218864441},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5098968744277954},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4983959197998047},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4748908579349518},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.4623905420303345},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4426795542240143},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.4143868386745453},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3501613736152649},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3444841504096985},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27766484022140503},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23682859539985657},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2009.2030434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2009.2030434","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323550","display_name":"Kanagawa University","ror":"https://ror.org/02j6c0d67"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1499281737","https://openalex.org/W1526970571","https://openalex.org/W1549890695","https://openalex.org/W1604064347","https://openalex.org/W1980461136","https://openalex.org/W1990304797","https://openalex.org/W1995989679","https://openalex.org/W2060169610","https://openalex.org/W2074928311","https://openalex.org/W2083796634","https://openalex.org/W2092148937","https://openalex.org/W2098487689","https://openalex.org/W2141420453","https://openalex.org/W2152879038","https://openalex.org/W2950898060","https://openalex.org/W6682585465"],"related_works":["https://openalex.org/W187355268","https://openalex.org/W2126037447","https://openalex.org/W2080649440","https://openalex.org/W2108777864","https://openalex.org/W2963594438","https://openalex.org/W1511250635","https://openalex.org/W4353030701","https://openalex.org/W1482221758","https://openalex.org/W2612679081","https://openalex.org/W2039752281"],"abstract_inverted_index":{"In":[0,62],"the":[1,30,48,60,67,81,88,92,95,107,134],"model":[2],"of":[3,36,91,123,131],"perfectly":[4,50,53],"secure":[5],"message":[6],"transmission":[7,82],"(PSMT)":[8],"schemes,":[9],"there":[10],"are":[11,97],"n":[12,37,72],"channels":[13],"between":[14],"a":[15,18,44,129],"sender":[16,40,93],"and":[17,28,52,94,114],"receiver.":[19,61],"An":[20],"infinitely":[21],"powerful":[22],"adversary":[23],"A":[24],"may":[25],"corrupt":[26],"(observe":[27],"forge)":[29],"messages":[31],"sent":[32],"through":[33],"t":[34],"out":[35],"channels.":[38],"The":[39,120],"wishes":[41],"to":[42,47,127,133],"send":[43],"secret":[45],"s":[46],"receiver":[49,96],"privately":[51],"reliably":[54],"without":[55],"sharing":[56],"any":[57],"key":[58],"with":[59],"this":[63],"paper,":[64],"we":[65,105],"show":[66],"first":[68],"2-round":[69],"PSMT":[70],"for":[71,143],"=":[73],"2t":[74],"+":[75],"1":[76],"such":[77],"that":[78,104],"not":[79],"only":[80],"rate":[83],"is":[84,126],"O(n)":[85],"but":[86],"also":[87],"computational":[89],"costs":[90],"both":[98],"polynomial":[99],"in":[100],"n.":[101],"This":[102],"means":[103],"solve":[106],"open":[108],"problem":[109],"raised":[110],"by":[111],"Agarwal,":[112],"Cramer,":[113],"de":[115],"Haan":[116],"at":[117],"CRYPTO":[118],"2006.":[119],"main":[121],"novelty":[122],"our":[124],"approach":[125],"introduce":[128],"notion":[130],"pseudobasis":[132],"coding":[135,144],"theory.":[136],"It":[137],"will":[138],"be":[139],"an":[140],"independent":[141],"interest":[142],"theory,":[145],"too.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
